Displaying 20 results from an estimated 65 matches for "xsh".
Did you mean:
sh
2010 Sep 02
7
[PATCH] libxl: make libxl communicate with xenstored by socket or xenbus driver
...-------
diff -r eff592364826 tools/libxl/libxl.c
--- a/tools/libxl/libxl.c Wed Sep 01 11:23:49 2010 +0100
+++ b/tools/libxl/libxl.c Thu Sep 02 14:51:46 2010 +0100
@@ -1387,10 +1387,8 @@
{
libxl_device_model_starting *starting = for_spawn;
char *kvs[3];
- int rc;
struct xs_handle *xsh;
- xsh = xs_daemon_open();
/* we mustn''t use the parent''s handle in the child */
kvs[0] = "image/device-model-pid";
@@ -1398,9 +1396,10 @@
return;
kvs[2] = NULL;
- rc = xs_writev(xsh, XBT_NULL, starting->dom_path, kvs);
- if (rc)...
2010 Aug 13
0
[PATCH 1 of 4] libxl_device_generic_add: handle NULL fents or bents
...lini <stefano.stabellini@eu.citrix.com>
diff -r 85bd0f6e8fed tools/libxl/libxl_device.c
--- a/tools/libxl/libxl_device.c Fri Aug 13 13:55:51 2010 +0100
+++ b/tools/libxl/libxl_device.c Fri Aug 13 19:23:05 2010 +0100
@@ -76,21 +76,21 @@ retry_transaction:
t = xs_transaction_start(ctx->xsh);
/* FIXME: read frontend_path and check state before removing stuff */
- xs_rm(ctx->xsh, t, frontend_path);
- xs_rm(ctx->xsh, t, backend_path);
+ if (fents) {
+ xs_rm(ctx->xsh, t, frontend_path);
+ xs_mkdir(ctx->xsh, t, frontend_path);
+ xs_set_perm...
2011 Dec 16
13
[PATCH 0 of 4] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
Patch 1 modifies the guest ro and rw node creation to an open coding style
and cleans up some extraneous node creation.
Patch 2 modifies creation of the hvmloader key in xenstore and adds
2011 Mar 30
2
[PATCH] xenstore-stat v2
..." : "";
errx(1, "Usage: %s %s[-h] [-n NR] key", progname, mstr);
+ case MODE_stat:
+ mstr = incl_mode ? "stat " : "";
+ errx(1, "Usage: %s %s[-h] [-s] key [...]", progname, mstr);
}
}
@@ -286,6 +290,52 @@ do_watch(struct xs_handle *xsh, int max_events)
}
}
+static const char *
+perm_type_str(int perm_type)
+{
+ switch (perm_type) {
+ case XS_PERM_WRITE:
+ return "-w";
+ case XS_PERM_READ:
+ return "r-";
+ case XS_PERM_READ|XS_PERM_WRITE:
+ return "rw";
+ cas...
2007 Oct 24
16
PATCH 0/10: Merge PV framebuffer & console into QEMU
The following series of 10 patches is a merge of the xenfb and xenconsoled
functionality into the qemu-dm code. The general approach taken is to have
qemu-dm provide two machine types - one for xen paravirt, the other for
fullyvirt. For compatability the later is the default. The goals overall
are to kill LibVNCServer, remove alot of code duplication and/or parallel
impls of the same concepts, and
2006 Aug 02
0
[PATCH] xenstore-chmod
...if defined(CLIENT_exists) || defined(CLIENT_list)
errx(1, "Usage: %s [-h] [-s] key [...]", progname);
+#elif defined(CLIENT_chmod)
+ errx(1, "Usage: %s [-h] [-s] key <mode [modes...]>", progname);
#endif
}
@@ -78,10 +80,61 @@ do_rm(char *path, struct xs_handle *xsh,
}
#endif
+#if defined(CLIENT_chmod)
+#define PATH_SEP ''/''
+#define MAX_PATH_LEN 256
+
+static void
+do_chmod(char *path, struct xs_permissions *perms, int nperms, int upto,
+ int recurse, struct xs_handle *xsh, xs_transaction_t xth)
+{
+ int ret;
+
+ if (!path[0])
+ re...
2013 Nov 25
22
[PATCH 0/4] Coverity fixes for tools/libxl
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
--
1.7.10.4
2010 Aug 12
0
[PATCH, v2]: xl: Implement per-API-call garbage-collection lifetime
...xl_ctx_init(libxl_ctx *ctx, int v
static void do_free_version_info(libxl_version_info *info);
int libxl_ctx_free(libxl_ctx *ctx)
{
- libxl_free_all(ctx);
- free(ctx->alloc_ptrs);
xc_interface_close(ctx->xch);
do_free_version_info(&ctx->version_info);
if (ctx->xsh) xs_daemon_close(ctx->xsh);
@@ -86,6 +78,7 @@ int libxl_ctx_free(libxl_ctx *ctx)
int libxl_domain_make(libxl_ctx *ctx, libxl_domain_create_info *info,
uint32_t *domid)
{
+ libxl_gc gc = LIBXL_INIT_GC(ctx);
int flags, ret, i, rc;
char *uuid_string;
cha...
2011 Dec 14
18
[PATCH 0 of 3] Support for VM generation ID save/restore and migrate
This patch series adds support for preservation of the VM generation ID buffer
address in xenstore across save/restore and migrate, and also code to
increment the value in all cases except for migration.
The first patch modifies creation of the hvmloader key in xenstore and adds
creation of a new read/write hvmloader/generation-id-addr key.
The second patch changes hvmloader to use the new key (as
2012 Dec 14
1
[PATCH V5] libxenstore: filter watch events in libxenstore when we unwatch
...s_fileno(). */
h->watch_pipe[0] = h->watch_pipe[1] = -1;
+ h->unwatch_filter = false;
+
#ifdef USE_PTHREAD
pthread_mutex_init(&h->watch_mutex, NULL);
pthread_cond_init(&h->watch_condvar, NULL);
@@ -287,6 +293,9 @@ struct xs_handle *xs_open(unsigned long flags)
if (!xsh && !(flags & XS_OPEN_SOCKETONLY))
xsh = get_handle(xs_domain_dev());
+ if (xsh && (flags & XS_UNWATCH_FILTER))
+ xsh->unwatch_filter = true;
+
return xsh;
}
@@ -753,6 +762,19 @@ bool xs_watch(struct xs_handle *h, const char *path, const char *token)
ARRAY_...
2012 Nov 07
4
[PATCH 2/2] 4.1.2 blktap2 cleanup fixes.
...th) return;
@@ -75,5 +76,11 @@ void libxl__device_destroy_tapdisk(libxl
err = tap_ctl_find(type, disk, &tap);
if (err < 0) return;
+ /*
+ * Remove the instance of the backend device to avoid a deadlock with the
+ * removal of the tap device.
+ */
+ xs_rm(ctx->xsh, XBT_NULL, be_path);
+
tap_ctl_destroy(tap.id, tap.minor);
}
diff -r b184698e0893 tools/libxl/libxl_device.c
--- a/tools/libxl/libxl_device.c Tue Nov 06 19:53:48 2012 -0600
+++ b/tools/libxl/libxl_device.c Tue Nov 06 19:54:23 2012 -0600
@@ -250,8 +250,7 @@ int libxl__device_destroy(libxl_ctx...
2012 Dec 14
1
[PATCH V4] libxenstore: filter watch events in libxenstore when we unwatch
...s_fileno(). */
h->watch_pipe[0] = h->watch_pipe[1] = -1;
+ h->unwatch_filter = false;
+
#ifdef USE_PTHREAD
pthread_mutex_init(&h->watch_mutex, NULL);
pthread_cond_init(&h->watch_condvar, NULL);
@@ -287,6 +293,9 @@ struct xs_handle *xs_open(unsigned long flags)
if (!xsh && !(flags & XS_OPEN_SOCKETONLY))
xsh = get_handle(xs_domain_dev());
+ if (xsh && (flags & XS_UNWATCH_FILTER))
+ xsh->unwatch_filter = true;
+
return xsh;
}
@@ -753,6 +762,19 @@ bool xs_watch(struct xs_handle *h, const char *path, const char *token)
ARRAY_...
2012 Jan 05
1
[PATCH] add feature flag to xenstore for XS_RESET_WATCHES
...iff -r 3a22ed3ec534 -r 2f5a98692acd tools/libxl/libxl_create.c
--- a/tools/libxl/libxl_create.c
+++ b/tools/libxl/libxl_create.c
@@ -434,6 +434,7 @@ retry_transaction:
libxl__xs_writev(gc, t, libxl__sprintf(gc, "%s/platform", dom_path), info->platformdata);
xs_write(ctx->xsh, t, libxl__sprintf(gc, "%s/control/platform-feature-multiprocessor-suspend", dom_path), "1", 1);
+ xs_write(ctx->xsh, t, libxl__sprintf(gc, "%s/control/platform-feature-xs_reset_watches", dom_path), "1", 1);
if (!xs_transaction_end(ctx->xsh, t,...
2011 Nov 04
2
[PATCH V3 REBASE 1/2] libxl_qmp: Introduce libxl__qmp_pci_del
To remove a pci passthough device from QEMU (upstream).
Signed-off-by: Anthony PERARD <anthony.perard@citrix.com>
---
tools/libxl/libxl_internal.h | 2 ++
tools/libxl/libxl_qmp.c | 35 +++++++++++++++++++++++++++++++++++
2 files changed, 37 insertions(+), 0 deletions(-)
diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
index 1dff211..84da6b1 100644
---
2014 May 20
3
Setting mail location in SQL?
Trying to figure out the syntax to set a mail_location for SQL. This
doesn't work:
userdb {
driver = sql
args = /etc/dovecot/master-combined-sql.conf
override_fields =
mail_location=maildir:/fakedir/%d/%n:INBOX=/fakedir:LAYOUT=fs
}
Does anyone know the proper syntax?
Thanks in advance
2013 May 13
11
[PATCH] Fix QEMU HVM hotplug race in QEMU traditional (Xen 4.1, Xen 4.2, and Xen 4.3) (v1).
Hey Ian and Stefano,
Please see this thread: http://lists.xen.org/archives/html/xen-devel/2013-05/msg01053.html
for the debug patches and some of the discussion.
These three patches fix an race that has been in QEMU traditional for a long time.
The guts of the bug is that if you have a guest with these options:
vcpus=1
maxvcpus=32
and do ''xl vcpu-set <guest> 32'' the
2012 Dec 13
4
[PATCH V3] libxenstore: filter watch events in libxenstore when we unwatch
...xs_fileno(). */
h->watch_pipe[0] = h->watch_pipe[1] = -1;
+ h->unwatch_safe = false;
+
#ifdef USE_PTHREAD
pthread_mutex_init(&h->watch_mutex, NULL);
pthread_cond_init(&h->watch_condvar, NULL);
@@ -287,6 +293,9 @@ struct xs_handle *xs_open(unsigned long flags)
if (!xsh && !(flags & XS_OPEN_SOCKETONLY))
xsh = get_handle(xs_domain_dev());
+ if (xsh && (flags & XS_UNWATCH_SAFE))
+ xsh->unwatch_safe = true;
+
return xsh;
}
@@ -753,6 +762,19 @@ bool xs_watch(struct xs_handle *h, const char *path, const char *token)
ARRAY_SIZE...
2009 Nov 18
6
[PATCH 1/3] libxenlight: Clean up logging arrangements
...91 +++++++++++++++++++++++------------------
tools/libxl/libxl_device.c | 27 +++++++++----
tools/libxl/libxl_dom.c | 11 +++--
tools/libxl/libxl_exec.c | 2 +-
tools/libxl/libxl_internal.c | 39 +++++++++++++++---
tools/libxl/libxl_internal.h | 11 ++++-
tools/libxl/libxl_xshelp.c | 5 ++
7 files changed, 124 insertions(+), 62 deletions(-)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index 69690e4..5e2f23b 100644
--- a/tools/libxl/libxl.c
+++ b/tools/libxl/libxl.c
@@ -106,14 +106,17 @@ int libxl_domain_make(struct libxl_ctx *ctx, libxl_domain_create_info...
2003 Sep 24
1
Problem using C random generator called from R
Hello
I'm trying to use C random generator function drand48() which return
floating-point values, uniformly distributed over [0,1],
(http://www.opengroup.org/onlinepubs/007908799/xsh/drand48.html). When
values are returned to R, they are not in [0,1]. A simple C program using
drand48() gives values in [0,1] so I suppose there is a problem (type
definition ?) between C and R. Here are R and C function and an example.
# R function
simulC <- function(n)
{
dyn.load("...
2020 Sep 13
2
Invalid transformation in LibCallSimplifier::replacePowWithSqrt?
...t of +Inf (indicating an exact result
for the operation and, since IEEE Std 754-2008 subclause 9.1.1 states that
domain errors are to be indicated by a NaN result, a lack of a domain
error).
It is noted that the above statements were made notwithstanding the ERRORS
section of pow() in POSIX.1-2017 XSH Chapter 3, which specifies a domain
error except perhaps by deference to the C standard due to a conflict
between the POSIX and the C wording.
The transformation in question causes EDOM for pow(-Inf, 0.5) even on
platforms where the system library implementation of pow does not cause
this situati...